Skip to main content

CVE-2024-0933: CWE-434 Unrestricted Upload in Niushop B2B2C

Medium
VulnerabilityCVE-2024-0933cvecve-2024-0933cwe-434
Published: Fri Jan 26 2024 (01/26/2024, 17:00:04 UTC)
Source: CVE Database V5
Vendor/Project: Niushop
Product: B2B2C

Description

A vulnerability was found in Niushop B2B2C V5 and classified as critical. Affected by this issue is some unknown functionality of the file \app\model\Upload.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252140. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/07/2025, 23:42:20 UTC

Technical Analysis

CVE-2024-0933 is a critical vulnerability identified in Niushop B2B2C version 5, specifically related to an unrestricted file upload flaw located in the \app\model\Upload.php component. This vulnerability falls under CWE-434, which concerns improper restrictions on file uploads. The flaw allows an attacker with at least low-level privileges (PR:L) to remotely upload arbitrary files without sufficient validation or restriction. The vulnerability does not require user interaction (UI:N) and can be exploited over the network (AV:N) with low attack complexity (AC:L). The impact of successful exploitation includes potential confidentiality, integrity, and availability compromises, as attackers may upload malicious scripts or executables leading to remote code execution, data leakage, or service disruption. Although the CVSS v3.1 score is 6.3 (medium severity), the unrestricted upload nature combined with remote exploitation capability elevates the risk profile, especially in environments where the application handles sensitive business or customer data. The vendor has not responded to disclosure attempts, and no official patches are currently available, increasing the urgency for organizations to implement mitigations. Public exploit details have been disclosed, though no active exploitation in the wild has been reported yet.

Potential Impact

For European organizations using Niushop B2B2C V5, this vulnerability poses a significant risk. Given the B2B2C platform's role in managing business-to-business and business-to-consumer transactions, exploitation could lead to unauthorized access to sensitive customer data, financial information, and business operations. Attackers could upload web shells or malware, enabling persistent access or lateral movement within corporate networks. This could result in data breaches, reputational damage, regulatory non-compliance (e.g., GDPR violations), and operational downtime. The medium CVSS score may underestimate the real-world impact, as unrestricted upload vulnerabilities often serve as initial vectors for more severe attacks. European companies in retail, e-commerce, and supply chain sectors relying on Niushop B2B2C are particularly vulnerable, potentially affecting their customers and partners across the continent.

Mitigation Recommendations

Since no official patch is available, European organizations should immediately implement compensating controls. These include: 1) Restricting file upload functionality to authenticated and authorized users only, minimizing the attack surface. 2) Implementing strict server-side validation to allow only safe file types (e.g., images) and enforcing file size limits. 3) Employing content scanning tools to detect and block malicious payloads within uploaded files. 4) Configuring web server permissions to prevent execution of uploaded files in upload directories (e.g., disabling script execution). 5) Monitoring logs and network traffic for unusual upload activity or access patterns. 6) Isolating the upload functionality within a sandboxed environment or separate service to limit potential damage. 7) Considering temporary disabling of file upload features if feasible until a patch is released. 8) Engaging with Niushop vendors or community for updates and patches. These measures go beyond generic advice by focusing on practical, layered defenses tailored to the specific vulnerability context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-26T08:35:47.074Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68387d4f182aa0cae28316d7

Added to database: 5/29/2025, 3:29:19 PM

Last enriched: 7/7/2025, 11:42:20 PM

Last updated: 7/8/2025, 6:58:09 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats